Skip to main content
. 2023 Dec 1;13:21255. doi: 10.1038/s41598-023-46640-9

Table 3.

A comparative study between the most recent IoT datasets.

IoT datasets Year Attack categories Availability Authors Application Developer Web link Labeled
data
Size Drawbacks
MQTT-IoT-IDS202036 2020 MQTT brute-force attack, UDP scan, Sparta SSH brute-force, and Aggressive scan

Yes/Free/

Downloadable

H. Hindy, C. Tachtatzis, R. Atkinson, E. Bayne, X. Bellekens IoT cybersecurity IEEE Data Port https://ieee-dataport.org/open-access/mqtt-iot-ids2020-mqtt-internet-things-intrusion-detection-dataset Yes Approx. 1.65 GB MQTT-IoT-IDS2020 exclusively focused on the MQTT protocol
MQTTSet37 2021 DoS, SlowITe, Flooding, Bruteforce, and Malformed data

Yes/Free/

Downloadable

I. Vaccari, G. Chiola, M. Aiello, M. Mongelli, and E. Cambiaso IoT cybersecurity https://www.kaggle.com/cnrieiit/mqttset Yes 10 GB MQTTSet only applicable on the MQTT protocol
IOT-2338 2020 Nine attack categories

Yes/Free/

Downloadable

S. Garcia, A. Parmisano, and M. J. Erquiaga IoT cybersecurity Avast, AIC group, CTU https://zenodo.org/record/4743746#.YXeyAhyEZPY Yes 21 GB IOT-23 lacks some kinds of attacks
Bot-IoT39 2018 DDoS, DoS, reconnaissance, and theft

Yes/Free/

Downloadable

K. Nickolaos, M. Nour, E. Sitnikova, and T. Benjamin, IoT botnet Cyber Range Lab of the University of New South Wales (UNSW) Canberra Cyber https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/bot_iot.php Yes 69.3 GB Bot_IoT lacks some kinds of attacks and does not contain the different types of the applications of IoT
TON_IoT40 2020 DDoS, DoS, Scanning, password cracking attack, XSS, data injection, ransomware, backdoor and MITM attack

Yes/Free/

Downloadable

N. Moustafa IoT/IIoT cybersecurity ACCS (Australian Centre for Cyber Security’s) Cyber Range Lab https://ieee-dataport.org/documents/toniot-datasets Yes 67 GB